
5.3.2 - Keeping Data Safe from Security Threats
Authored by subscription ISB
Computers
10th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
71 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security solution gives different users different permissions to view, edit or delete data?
Access levels
SSL
Privacy settings
Anti-spyware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a school system, teachers can edit reports but students can only view their own data. Which method is being used?
Firewall
Proxy server
Access levels
SSL
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of software is designed specifically to detect and remove spyware?
Firewall
Anti-spyware
Proxy server
SSL
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of authentication?
Proxy server
Privacy setting
Software update
Biometrics
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of two-step verification?
To add an extra check that the user is really who they claim to be
To hide the user’s IP address
To block all incoming traffic
To store browsing history
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why do automatic software updates improve security?
They make passwords longer
They stop users making mistakes
They fix weaknesses in software quickly
They permanently block all unknown websites
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which message should make a user most suspicious?
A message with clear spelling and a normal tone
A message with poor spelling and an unusually urgent tone
A message from a known friend about homework
A message stored in a browser history
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?